Skip to main content
Log in

A strong multi-designated verifiers signature scheme

  • Research Article
  • Published:
Frontiers of Electrical and Electronic Engineering in China

Abstract

Based on Chameleon Hash and D. Boneh’s one round multi-party key agreement protocol, this paper proposes a multi-designated verifiers signature scheme. In this scheme only the verifiers designated by the signer can independently verify the signature. And no one else other than the designated person can be convinced by this signature even if one of the designated verifiers reveals the secret value. The analysis of the proposed scheme shows that it satisfies non-transferability, unforgeability and privacy of the signer’s identity and has to low computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications. In: Proceedings of Advances in Cryptology-Eurocrypt’96. Berlin: Springer-Verlag, 1996, 1070: 143–154

    Google Scholar 

  2. Saeednia S, Kremer S, Markowitch O. An efficient strong designated verifier signature scheme. In: Proceedings of the 6th International Conference on Information Security and Cryptology — ICISC 2003. Berlin: Springer-Verlag, 2004, 2971: 40–54

    Google Scholar 

  3. Laguillaumie F, Vergnaud D. Designated verifier signature: anonymity and efficient construction from any bilinear map. In: Proceedings of the 4th International Conference on Security in Communication Networks’04 (SCN04). Berlin: Springer-Verlag, 2005, 3352: 105–119

    Google Scholar 

  4. Desmedt Y. Verifier-Designated Signatures. Rump Session, Crypto’03, 2003

  5. Laguillaumie F, Vergnaud D. Multi-designated verifiers signatures. In: Proceedings of the 6th International Conference on Information and Communications Security — ICICS 2004. Berlin: Springer-Verlag, 2004, 3269: 495–507

    Google Scholar 

  6. Boneh D, Silverberg A. Applications of multilinear forms to cryptography. Contemporary Mathematics, 2003, 324: 71–90

    MathSciNet  Google Scholar 

  7. Krawczyk H, Rabin T. Chameleon signatures. In: Proceeding of Network and Distributed System Security Symposium, California. 2000, 143–154

  8. Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. 5th ed. Boca Raton: CRC Press, 2001, 451–462

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Yang.

Additional information

__________

Translated from Journal of Beijing University of Posts and Telecommunications, 2007, 30(5): 1–4 [译自: 北京邮电大学学报]

About this article

Cite this article

Yang, B., Xiao, Z., Yang, Y. et al. A strong multi-designated verifiers signature scheme. Front. Electr. Electron. Eng. Ch 3, 167–170 (2008). https://doi.org/10.1007/s11460-008-0035-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11460-008-0035-1

Keywords

Navigation